This book deals with the theory, design principles, and application of hybrid intelligent systems using type-2 fuzzy sets in combination with other paradigms of Soft Computing technology such as Neuro-Computing and Evolutionary Computing. Meer
The recent pursuits emerging in the realm of big data processing, interpretation, collection and organization have emerged in numerous sectors including business, industry and government organizations. Meer
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. Meer
This volume presents the proceedings of the 11th International Conference on the Design of Cooperative Systems (COOP 2014). The conference is a venue for multidisciplinary research contributing to the design, assessment and analysis of cooperative systems and their integration in organizations, public venues, and everyday life. Meer
This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. Meer
Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. Meer
This research book presents some specific multimedia systems that have been developed and applied in practice. More specifically, it consists of an editorial, an introductory chapter and six chapters as below. Meer
This book describes the methodology and accompanying technology for reducing the costs of validation of changes by introducing automatic techniques to analyze and test software increments. Meer
In many application areas, it is necessary to make effective decisions under constraints. Several area-specific techniques are known for such decision problems; however, because these techniques are area-specific, it is not easy to apply each technique to other applications areas. Meer
This book includes a selection of papers from the 2018 World Conference on Information Systems and Technologies (WorldCIST'18), held in Naples, Italy on March27-29, 2018. Meer
This book includes a selection of papers from the 2018 World Conference on Information Systems and Technologies (WorldCIST'18), held in Naples, Italy on March27-29, 2018. Meer
This book includes a selection of papers from the 2018 World Conference on Information Systems and Technologies (WorldCIST'18), held in Naples, Italy on March27-29, 2018. Meer
This book offers the first comprehensive and critical literature review of fuzzy pairwise comparison methods derived from methods originally developed for crisp pairwise comparison matrices. Meer
This book constitutes extended selected papers from the 15th Conference on Advanced Information Technologies for Management, AITM 2017, and the 12th Conference on Information Systems Management, ISM 2017, held as part of the Federated Conference on Computer Science and Information Systems, FedCSIS, which took place in Prague, Poland, in September 2017. Meer
This book constitutes the proceedings of the 5th Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2023, held in Volgograd, Russia, in September 2023. Meer
Focusing on the fundamentals of machine learning, this book covers broad areas of data-driven modeling, ranging from simple regression to advanced machine learning and optimization methods for applications in materials modeling and discovery. Meer
Providing readers with a detailed examination of resilient controls in risk-averse decision, this monograph is aimed toward researchers and graduate students in applied mathematics and electrical engineering with a systems-theoretic concentration. Meer
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems. Meer
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Meer
This book discusses smart, agile software development methods and their applications for enterprise crisis management, presenting a systematic approach that promotes agility and crisis management in software engineering. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books